"... when they ask us what we are doing, we will answer: we remember. Yes, we are the memory of mankind, and therefore we will certainly win in the end"
Ray Bradbury
Binance exchange "removed" Sberbank and Tinkoff from the list of payment systems. Instead of two banking options, "Rosbank" and "Tinkoff", new names "local card (green)" and "local card (yellow)" appeared. A few days later, the exchange banned Russians from transactions through a p2p service with any currency other than the ruble. Even later, the exchange allowed a complete withdrawal from Russia.
The End of the Russian Idea. What It Will Take to Break Putinism’s Grip: https://www.foreignaffairs.com/russian-federation/vladimir-putin-end-russian-idea?utm_content=20230822
A New Tool Shows What War Has Done to Ukraine’s Forests: https://www.bellingcat.com/resources/2023/08/18/a-new-tool-shows-what-war-has-done-to-ukraines-forests/
Can AI Chatbots Be Used for Geolocation: https://www.bellingcat.com/resources/2023/07/14/can-ai-chatbots-be-used-for-geolocation/
More than Mountaineering. Using PeakVisor for Geolocation: https://www.bellingcat.com/resources/2023/07/13/more-than-mountaineering-using-peakvisor-for-geolocation/
Steganography. How images can hide secret messages in plain sight: https://www.blackhatethicalhacking.com/articles/steganography-how-images-can-hide-secret-messages-in-plain-sight/
Who is who in the OSINT Community: https://osint-mindset.gitbook.io/index/community/kto-est-kto-v-osint
Wireshark 4.0.8 released: https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html
Within the realm of Google Fact Check Tools, you'll come across two useful companions: the Fact Check Explorer and the Fact Check Markup Tool. Take a closer look at them right here: https://toolbox.google.com/factcheck/explorer
Find social media profiles FAST with this OSINT tool: https://www.youtube.com/watch?v=sXn1GBgSpUQ
OSINT Resources by Country. OSINT Resources repository, organized by country. Here you'll find a collection of links to various OSINT tools, websites, and projects that are specific to different countries. Feel free to contribute by adding more resources through pull requests: https://github.com/wddadk/OSINT-for-countries
ChatGPT in terminal without needing API keys: https://github.com/aandrew-me/tgpt
Instagram Explorer by OSINT Combine. This tool is designed to make finding images by date on Instagram at particular locations easier and more efficient: https://www.osintcombine.com/instagram-explorer
Plate Recognizer. Automatic License Plate Recognition software that works in all environments, optimized for your location: https://platerecognizer.com/
A Curated list of Awesome Python Scripts that Automate Stuffs: https://github.com/hastagAB/Awesome-Python-Scripts
Discord-OSINT. OSINT Discord resources that may be useful for searching or pivotting on Discord: https://github.com/wddadk/Discord-OSINT
Data-OSINT. You can find links to data acquisition websites. Some sites will charge you for their service, however some will also offer a small amount of data for free. Always remember to consider what data you are allowed or not allowed to collect. When researching data, always be careful what you click or download as malware maybe present. Telegram is included however you will have to find groups and bots on the platform and these change frequently: https://github.com/cqcore/Data-OSINT
osint4all start.me OSINT tools & services collection: https://start.me/p/L1rEYQ/osint4all
DFIR-Detection-Engineering: https://github.com/adrianlois/DFIR-Detection-Engineering
FavFreak. Weaponizing favicon.ico for BugBounties , OSINT and what not: https://github.com/devanshbatham/FavFreak
BruteSpray. Brute-Forcing from Nmap output - Automatically attempts default creds on found services: https://github.com/x90skysn3k/brutespray
NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications: https://github.com/0xKayala/NucleiFuzzer
LinkedIn: OSINTech's Featured Timeline
SubStack: OSINTech's Substack
WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.
